CIS 90 - Lesson 3

Total Page:16

File Type:pdf, Size:1020Kb

CIS 90 - Lesson 3 CIS 90 - Lesson 3 Lesson Module Checklist • Slides • WB • Flash cards • Properties • Page numbers • 1st minute quiz • Web Calendar summary • Web book pages • Commands • Lab tested • MSDNAA accounts made • VMware AA accounts made • CIS Lab schedule published • Census done • cis90-students alias in /etc/aliases + newaliases command • Welcome ready for mailing • Historical events ready for mailing • 9V backup battery for microphone • Backup slides, CCC info, handouts on flash drive 1 CIS 90 - Lesson 3 Instructor: Rich Simms Dial-in: 888-450-4821 Passcode: 761867 Aaron Andrew B. Andrew C. Arthur Brian Cory Daniel David G. Dave L. David P. Debbie Edtson Fidel Humberto Hunter Imara Ismael Jessica Joseph Juliana Lucie Marc Marty Matt Michael Rochelle Shawn Tabitha Taylor Tyler Will Zachary Zsolt Email me ([email protected]) a relatively current photo of your face for 3 points extra credit CIS 90 - Lesson 3 Introductions and Credits Jim Griffin • Created this Linux course • Created Opus and the CIS VLab • Jim’s site: http://cabrillo.edu/~jgriffin/ Rich Simms • HP Alumnus • Started teaching this course in 2008 when Jim went on sabbatical • Rich’s site: http://simms-teach.com And thanks to: • John Govsky for many teaching best practices: e.g. the First Minute quizzes, the online forum, and the point grading system (http://teacherjohn.com/) 3 CIS 90 - Lesson 3 [ ] Preload White Board with cis*lesson??*-WB [ ] Connect session to Teleconference Session now connected to teleconference [ ] Is recording on? Red dot means recording [ ] Use teleconferencing, not mic 4 Should be greyed out CIS 90 - Lesson 3 [ ] Video (webcam) optional [ ] layout and share apps [ ] Share Foxit, Putty, and Chrome foxit for slides chrome vSphere Client putty 5 CIS 90 - Lesson 3 [ ] Video (webcam) optional [ ] Follow moderator [ ] Double-click on postages stamps 6 CIS 90 - Lesson 3 Universal Fix for CCC Confer: 1) Shrink (500 MB) and delete Java cache 2) Uninstall and reinstall latest Java runtime Control Panel (small icons) General Tab > Settings… 500MB cache size Delete these Google Java download 7 CIS 90 - Lesson 3 First Minute Quiz Please answer these questions in the order shown: 1. What is the command to print the manual page for a command? 2. How do you show your path? 3. Name four directories where one can find commands? email answers to: [email protected] (answers must be emailed within the first few minutes of class for credit) 8 CIS 90 - Lesson 3 Electronic Mail Objectives Agenda • Learn how to use the UNIX • Quiz communication tools write and mail. • Questions from last week • Overview on end-to-end email. • Mini review • Housekeeping • Write • Basic Mail • More on Mail • End-to-end email • Other MUAs, MTAs, DA and AAs • Wrap up 9 CIS 90 - Lesson 3 Class Activity If you haven’t already, log into Opus 10 CIS 90 - Lesson 3 Questions 11 CIS 90 - Lesson 3 Questions How this course works? Previous lessons Previous labs? 他問一個問題,五分鐘是個傻子,他不問一個問題仍然是一個 Chinese 傻瓜永遠。 Proverb He who asks a question is a fool for five minutes; he who does not ask a question remains a fool forever. 12 CIS 90 - Lesson 3 Lab 1 Results (xx times answered incorrectly) 1 X "1) What is your shell prompt on Doc?" 0 "2) What is your shell prompt on Opus?" 0 "3) What is your shell prompt on your assigned Arwen system?" 0 "4) What distro has been installed on Catalina?" 1 X "5) Log into Catalina and Thabiti as cis90. Are your uid numbers the same on both?" 9 XXXXXXXXX "6) Which shell program are your running on your Arwen system?" 2 XX "7) On Catalina, which remote system did Juliet log in from?" 2 XX "8) On Doc, what is the output from the hostname command?" 2 XX "9) Log in twice into Opus. Does exiting one session exit you from the other session?" 3 XXX "10) Log in twice into your Arwen. What is the output of the tty command in each session?" 5 XXXXX "11) Stay logged twice into your Arwen. How are your two sessions distinguished in the who output?" 1 X "12) What is the name of the kernel running on Doc?" 11 XXXXXXXXXXX "13) Log into the system named Thabiti, is Linux or UNIX installed?" 14 XXXXXXXXXXXXXX "14) Log in as cis90 to the system whose name is the answer to Q7. What shell is running?" 17 XXXXXXXXXXXXXXXXX "15) What does the tty command output on your Arwen's tty5 virtual console?" 7 XXXXXXX *** NO SUBMITTAL *** 14 CIS 90 - Lesson 3 6) Which shell program are your running on your Arwen system? Use the ps command to print your processes This list shows two processes. The first is the bash shell and the second is the ps command The answer is: bash 16 CIS 90 - Lesson 3 11) Stay logged twice into your Arwen. How are your two sessions distinguished in the who output?" The answer is: They are distinguished by the terminal device used, e.g. pts/0 vs pts/1 17 CIS 90 - Lesson 3 13) Log into the system named Thabiti, is Linux or UNIX installed? Use uname to show the name of the kernel, google the name of the kernel if it's not Linux The answer is: UNIX 18 CIS 90 - Lesson 3 7) On Catalina, which remote system did Juliet log in from? 14) Log in as cis90 to the system whose name is the answer to Q7. What shell is running? On Catalina use who to see that Juliet logged in from Razia. Log into Razia and use the ps command to see the name of the shell The answer is: sh Many shell programs have been written for UNIX/Linux. sh was the original shell written by Stephen Bourne at ATT, the csh ("C shell") was written by Bill Joy at UC Berkeley, the bash ("Bourne"-Again Shell) was written by Brian Fox for the GNU project. We will use bash in CIS 90. 19 CIS 90 - Lesson 3 15) What does the tty command output on your Arwen's tty5 virtual console? 1) Log into VLab 2) Open a console for your Arwen 3) Change to Virtual terminal tty5 The answer is: /dev/tty5 20 CIS 90 - Lesson 3 For those who didn't submit Lab 1 If you would like some help getting started, come see us in the CIS Lab. Leandro and Geoffrey are both CIS 90 Alumni. Michael teaches the Linux System Administration class (CIS 191). 21 CIS 90 - Lesson 3 Housekeeping 22 CIS 90 - Lesson 3 Lab 2 due tonight • Use history -a before using submit. If you neglect to do this the history snapshot you send me to grade will not have the latest commands you issued. • Submit as many times as you wish up to 11:59PM • You can optionally use the verify command to see what you submitted for grading. To grade, I will check your history to see if you used all the commands asked for in Lab 2 as well as your answers to the three questions. 23 CIS 90 - Lesson 3 Lord of the Rings Code Names http://simms-teach.com/cis90grades.php Your grade code names are now available. Send me your survey to get your code name. 24 CIS 90 - Lesson 3 Review your graded lab work ls cat lab01.graded Use the ls command to list the files in your home directory Use the cat command to show your graded work 25 CIS 90 - Lesson 3 Review the correct answers for a lab cat /home/cis90/answers/lab01 The answers to quizzes, tests and labs will be posted to the /home/cis90/answers directory after the due date has passed. 26 CIS 90 - Lesson 3 Review the correct answers for a quiz cat /home/cis90/answers/quiz01 The answers to quizzes, tests and labs will be posted to the /home/cis90/answers directory after the due date has passed. 27 CIS 90 - Lesson 3 Extra Credit Note the caps on extra credit. 28 CIS 90 - Lesson 3 Extra Credit Howtos If you have a strong interest in a topic write a Howto on it to share what you've learned and earn some extra credit at the same time 29 CIS 90 - Lesson 3 Software for CIS students How to obtain Microsoft and VMware software for academic use 30 CIS 90 - Lesson 3 MSDN for CIS Students Accounts for students enrolled in CIS 90 have been created using your WebAdvisor email addresses. Link is on website Resources page in Tools and Software section Happy downloading! 31 CIS 90 - Lesson 3 VMware Software for CIS Students Accounts for students enrolled in CIS 90 have been created using your WebAdvisor email addresses. Link is on website Resources page in Tools and Software section Happy downloading! 32 CIS 90 - Lesson 3 • Don't forget to register on the forum • Next week is the 1st five post deadline! (worth 20 points) • Only your posts in the CIS 90 forum will earn points • Make sure your username is your full first and last name, separated by a space, so you get credit for your posts • Be nice and stay on topic with your posts! Email the instructor for username changes or login issues 33 CIS 90 - Lesson 3 Subtle Stuff 34 CIS 90 - Lesson 3 Putty to: [email protected] Opus (a RHEL server) vs oslab.cis.cabrillo.edu If you specify the username in Putty you won't be prompted for it, just the password. If you specify only the hostname in Putty you get prompted for both username and password. Tip: Use the Putty “Saved Sessions” for your Opus connection.
Recommended publications
  • Argosoft Mail Server Pro User Guide
    http://www.argosoft.com Argosoft Mail Server Pro User Guide June 2002 1 Introduction Thank you for choosing Argosoft Mail Server Pro. This lightweight and extremely affordable mail server is robust, stable, easy to configure, easy to manage and is fully capable of competing head to head with any mail server on the market. It can perform all basic e-mail tasks, and much more. It is fully functional mail system, which supports most popular protocols, SMTP, POP3, Finger, and has a built-in Web server, to give users quick and easy access to their email via any Web browser, which supports HTTP 1.0 or later. The web interface can also be used to administer the mail server. While this easy to use mail server is pretty much obvious in terms of use there are few little things that even a seasoned e-mail expert may not stumble across immediately. This document is basic guide to getting started! Features • Has true support of multiple domains - you can create accounts with the same name, which belong to different domains • Supports multiple IP homes (virtual domains) • Has built in mailing list server • Has WAP interface • Allows setup of domain administrators - users who can change domain related information via the Web interface; • Filtering of mail according to IP addresses of server which attempts to relay mail to local users • ORDB and MAPS support • Supports distribution lists; • Supports auto responders; • Supports basic filters; • Unlimited message size (there is a limit of 5 Megs for freeware version); • Can listen on single IP address, rather than all addresses available on your computer; • Has built-in web server.
    [Show full text]
  • Streamline the Process - a Real Life Example Yadong Zhang, Oxford Health Plans, Trumbull, CT
    Streamline the Process - A Real Life Example Yadong Zhang, Oxford Health Plans, Trumbull, CT ABSTRACT This paper presents a real life example on the evolution of a A SHELL SCRIPT TO THE RESCUE monthly report application. The application uses SAS/SQLâ pass â Now you get the DBF report that needs to be sent to the through and Base SAS to develop report and email the final business user. In our case, we run SAS on a UNIX box, product to the end user. The application also archives the log and our business users are on an NT server. So we and report automatically. either FTP the report to a shared place, or if the file is small enough, we email it to the user. That's exactly INTRODUCTION what I did in the first two runs: I FTP’d the file to my PC It is common for a SAS programmer to develop reports running and emailed it as an attachment. Tedious and time on a regular basis. How do you simplify the process? How do consuming, I began to hate it the third time I did it. So I you make your program to do the 'thinking' for you? This paper called on a shell script to the rescue. will present some tips on this subject. report.sh #!/bin/ksh PROBLEM # Declare shell variables On the first day of each month, produce a report on transitional ¶PGMDIR=/project/pgms care in DBF format, using tables on an Oracleâ data warehouse. ·PROG=report ¸RPTDATE="`date '+%Y-%m-%d'`" SOLUTION ¹ADM="yzhang@exchange-server" ºMAILTO="USER1@exchange-server As always, there is more than one way to do it in SAS.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Managing Sendmail Services in Oracle® Solaris 11.4
    ® Managing sendmail Services in Oracle Solaris 11.4 Part No: E61008 November 2020 Managing sendmail Services in Oracle Solaris 11.4 Part No: E61008 Copyright © 2002, 2020, Oracle and/or its affiliates. License Restrictions Warranty/Consequential Damages Disclaimer This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. Warranty Disclaimer The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Restricted Rights Notice If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software"
    [Show full text]
  • Servidor De Correo X Ubuntu
    UNIVERSIDAD NACIONAL DEL CAAGUAZÚ FACULTAD DE CIENCIAS Y TECNOLOGÍAS Servidor de Correo X Ubuntu Responsables Marcelo Abrahan Acuña Santander Mario Manuel Moreno González Profesor: Ing. Héctor Estigarribia Ingeniería en Informática Coronel Oviedo -2016- Resumen Un servidor de correo es una aplicación informática ubicada en una página web en internet cuya función es parecida al Correo postal solo que en este caso los correos (otras veces llamados mensajes) que circulan, lo hacen a través de nuestras Redes de transmisión de datos y a diferencia del correo postal, por este medio solo se pueden enviar adjuntos de ficheros de cualquier extensión y no bultos o paquetes al viajar la información en formato electrónico. Montar un servidor de correo electrónico a base de GNU/Linux y software libre está al alcance de cualquiera, pero mientras que para el usuario corriente no compensa el esfuerzo, en el ámbito de la empresa sí es una práctica extendida por razones de privacidad y control de la información. Para montar un servidor de correo electrónico son imprescindibles diferentes elementos entre los que destaca el propio software que hará las veces de “mensajero”, lo que técnicamente se denomina como Mail Transfer Agent (MTA) o agente de transporte de correo en español. Y como no podía ser de otra forma, son varias las alternativas disponibles en el mundo del Open Source. Por eso ofrecemos un somero repaso a alguna de las más populares. Palabras clave: Servidor de Correo, Correo postal, Redes de transmisión de Datos, Control de Información, Software, Agente de transporte de Correo, Open Source. Abstract A mail server is a computer application located on a web page on the internet whose function is similar to the Post only that in this case the mails (sometimes called messages) that circulate, they do it through our Data transmission networks and Unlike postal mail, by this means only attachments of files of any extension can be sent and not packages or packages when traveling the information in electronic format.
    [Show full text]
  • APT HOWTO (Obsolete Documentation)
    APT HOWTO (Obsolete Documentation) Gustavo Noronha Silva <[email protected]> 1.7.6 - 2002 年 1 月 ...要要要 こ.£書/、Debian .1#ケージ管理Fー&ィJ&ィ'あK APT ."き+$い&、 Fー ザ+深く理解し&BIうこ(R4¿し&い>す。そ.目¿/、新しい Debian Fーザ.生 aRS+したJ、シス&@管理+$い&理解R深Aたい(Áう®.±助け( *Kこ(' す。Debian Fーザが3ILKサ=ー(R改NすK目¿'、Debian 7M ジェク(.たA+ù 成されました。 QQQùùùñññJJJooo Copyright © 2001, 2002, 2003, 2004 Gustavo Noronha Silva This manual is free software; you may redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. This is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. See the GNU General Public License for more details. A copy of the GNU General Public License is available as /usr/share/common-licenses/GPL in the Debian GNU/Linux distribution or on the World Wide Web at the GNU General Public Licence. You can also obtain it by writing to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. i 目目目 hhh 1 //はじじじめAA+++ 1 2 ÇÇÇ%%%¿¿¿***設設設¡¡¡ 3 2.1 /etc/apt/sources.list ファイル .............................3 2.2 Mーカル'. APT .1いè ...............................4 2.3 sources.list 5ァ イ K+記述す 9き最Á*?Iーサ イ(.決¡: netselect, netselect-apt........................................5 2.4 sources.list ファイル+ CD-ROM R追加する .....................6 3 111##ッケケケーーージジジ...管管管理理理 9 3.1 利用可能*パッケージ.K覧Rf新する .......................9 3.2 パッケージ.インストーK ...............................9 3.3 パッケージ.ú! ....................................
    [Show full text]
  • National Infrastructure Protection Center Cybernotes Issue #2000-11 June 5, 2000
    National Infrastructure Protection Center CyberNotes Issue #2000-11 June 5, 2000 CyberNotes is published every two weeks by the National Infrastructure Protection Center (NIPC). Its mission is to support security and information system professionals with timely information on cyber vulnerabilities, hacker exploit scripts, hacker trends, virus information, and other critical infrastructure-related best practices. You are encouraged to share this publication with colleagues in the information and infrastructure protection field. Electronic copies are available on the NIPC Web site at http://www.nipc.gov. Please direct any inquiries regarding this publication to the Editor-CyberNotes, National Infrastructure Protection Center, FBI Building, Room 11719, 935 Pennsylvania Avenue, NW, Washington, DC, 20535. Bugs, Holes & Patches The following table provides a summary of software vulnerabilities identified between May 18 and June 2, 2000. The table provides the hardware/operating system, equipment/software name, potential vulnerability/impact, identified patches/workarounds/alerts, common name of the vulnerability, potential risk, and an indication of whether attacks have utilized this vulnerability or an exploit script is known to exist. Software versions are identified if known. This information is presented only as a summary; complete details are available from the source of the patch/workaround/alert, indicated in the footnote or linked site. Please note that even if the method of attack has not been utilized or an exploit script is not currently widely available on the Internet, a potential vulnerability has been identified. Updates from previous issues of CyberNotes are listed in bold. New information contained in the update will appear as red and/or italic text.
    [Show full text]
  • Model Checking an Entire Linux Distribution for Security Violations
    Model Checking An Entire Linux Distribution for Security Violations by Benjamin W. Schwarz Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, in partial satisfaction of the requirements for the degree of Master of Science, Plan II. Approval for the Report and Comprehensive Examination: Committee: David Wagner Research Advisor (Date) * * * * * * * Doug Tygar Second Reader (Date) Abstract Software model checking has become a popular tool for verifying pro- grams’ behavior. Recent results suggest that it is viable for finding and erad- icating security bugs quickly. However, even state-of-the-art model checkers are limited in use when they report an overwhelming number of false positives, or when their lengthy running time dwarfs other software development pro- cesses. In this paper we report our experiences with software model checking for security properties on an extremely large scale—an entire Linux distribu- tion consisting of 839 packages and 60 million lines of code. To date, we have discovered 108 exploitable bugs. Our results indicate that model checking can be both a feasible and integral part of the software development process. 2 Contents 1 Introduction 5 2 The MOPS Model Checker 6 2.1 Specification of Security Properties . 7 2.2 Scalability . 8 2.3 Error Reporting . 8 2.4 Efficient Model Checking with Pattern Variables . 9 2.4.1 Current implementation . 9 2.4.2 More Efficient Algorithms . 10 2.5 User Interface for Error Reporting . 11 2.6 Resource Usage . 12 3 Checking Security Properties 12 3.1 TOCTTOU . 13 3.2 A Standard File Descriptor Attack .
    [Show full text]
  • Sending and Reading Email
    Sending and Reading Email Get familiar with mailx, alpine, mutt, and mail. Creating a Signature file Automatically forwarding incoming messages Announcing an absence with vocation Configuring and managing email with procmail Using the Email An email message is identified by a sender and a receipt, both of which appear as headers in the message. mailx is a mail user agent for moving mails between users on the same host. Depending upon whether both sender and receipt are on the same host, an email address can take the following forms: 1. henry – user henry is on the same host 2. henry@saturn – henry is on a different host 3. [email protected] –henryis on the internet Internet Email Handling (1/3) Internet mail handling requires the works of at least three agencies: 1. Mail user agent –for reading the mailbox and sending mail, like mailx and pine. 2. Mail transport agent –for transporting mail between machines 3. Mail delivery agent –for delivering mail to the recipients’ mailboxes. MUA reads incoming mail from the mailbox and hands over outgoing mail to the MTA. MTA sends and receives mail. At the sending end, it identifies the recipient’s address and delivers the message directly to the MTA at the other end. At the receiving end, the MTA passes on mail to MDA. Internet Email Handling (2/3) MTA’s sending and receiving functions are handled universally by the simple mail transfer protocol (SMTP). The MTA doesn’t deliver mail. MDA does the delivery, like procmail. If the user’s host connects to the mail server intermittently, the user typically uses his ISP’s facilities to handle his mail.
    [Show full text]
  • Linux Network Administrators Guide Remote Systems
    Chapter 16. ManagingTaylor UUCP UUCP was designed in the late seventies by Mike Lesk at AT&T Bell Laboratories to provide a simple dialup network over public telephone lines. Despite the popularity of dialup PPP and SLIP connections to the Internet, many people who want to have email and Usenet News on their home machine still use UUCP because it is often cheaper, especially in countries where Internet users have to pay by the minute for local telephone calls, or where they do not have a local ISP and must pay long distance toll rates to connect. Although there are many implementations of UUCP running on a wide variety of hardware platforms and operating systems, overall, they are highly compatible. However, as with most software that has somehow become standard over the years, there is no UUCP that one would call the UUCP. It has undergone a steady evolution since the first version was implemented in 1976. Currently, there are two major species that differ mainly in their hardware support and configuration. Of these two, various implementations exist, each varying slightly from its siblings. One species is known as Version 2 UUCP, which dates back to a 1977 implementation by Mike Lesk, David A. Novitz, and Greg Chesson. Although it is fairly old, it is still frequently used. Recent implementations of Version 2 provide much of the comfort that the newer UUCP species do. The second species was developed in 1983 and is commonly referred to as BNU (Basic Networking Utilities) or HoneyDanBer UUCP. The latter name is derived from the authors' names (P.
    [Show full text]
  • UNIX System Servicesuser's Guide
    z/OS Version 2 Release 3 UNIX System Services User's Guide IBM SA23-2279-30 Note Before using this information and the product it supports, read the information in “Notices” on page 321. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1996, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures...................................................................................................... xv List of Tables......................................................................................................xvii About this document...........................................................................................xix Who should use z/OS UNIX System Services User's Guide?....................................................................xix What is in z/OS UNIX System Services User's Guide?........................................................................ xix Tasks that can be performed in more than one environment.............................................................xix z/OS information.................................................................................................................................. xix How to send your comments to IBM.....................................................................xxi If you
    [Show full text]
  • Interview with Mary Ann Horton RIK FARROWPROGRAMMING
    Interview with Mary Ann Horton RIK FARROWPROGRAMMING Mary Ann Horton has been a met Mary Ann Horton at USENIX ATC ’19 in Seattle. I didn’t know who UNIX developer and sysadmin she was, but somehow discovered that she worked on the control systems since 1977. She contributed to for the grid in the San Diego area, and we exchanged email addresses so Berkeley UNIX, creating the I we could continue the conversation. Later, I read her Wikipedia page [1] and first email attachments and enhancing vi. Her PhD dissertation at Berkeley learned much more about her. led to IDE editors that check your program for Rik Farrow: You have been working with UNIX since its earliest days. errors. While at Bell Labs, she led the UUCP Mapping Project and brought .com domains Mary Ann Horton: I fell in love with UNIX earning my master’s degree at Wisconsin in to UUCP email. She led the growth of Usenet, 1977, but my big break came in 1978 when I transferred to Berkeley for my PhD. We got a an early social media network, in the early VAX, initially with VMS, but quickly changed to UNIX 32/V. There were many amazing grad 1980s. Her EMS email system allowed email students contributing tools to BSD, and it was a treat to get to be part of this effort. It seemed addressing by database query. As a transgender like about half the code was written by Bill Joy, including vi. I got to enhance vi, nurture activist in the 1990s, she convinced Lucent it, and port it to all sorts of UNIX clones.
    [Show full text]